What three groups of people at the law firm

Assignment Help Basic Computer Science
Reference no: EM131003159

1. The law firm of Dewey, Cheatham, & Howe is considering the implementation of a new information system. To that end, they have hired your firm to perform the Systems Analysis process. They understand that a successful system must be aligned with the strategic trajectory of the firm. They have asked you to specify how the Requirements Analysis phase will promote this alignment.

2. What three groups of people at the law firm will you consult during the requirements analysis phase? What do you expect to learn from them that will help you define the system?

3. The DCH law firm will also need you to create a database for them. Specifically, they are concerned with organizing data on their clients, the lawyers on staff, and the paralegals that support them. Some things you should know:

- Clients can consult with any of the lawyers in the firm depending on what their specific needs are, and an individual lawyer may well deal with many of the clients (hence their motto: "In the clink? We'll get you out in a blink!").

- The paralegals are assigned to only one lawyer, but many of the lawyers will have a staff of paralegals depending on their workload.

Please provide the following:

A data model representing the system to be developed based on the information given above including all tables, keys, and relationships.
An SQL query that will list the clients who have dealt with our mortgage attorney, Mr. Snidely Whiplash. His Employee # is 666.

4. Discuss one of the threats (or vulnerabilities) that firms must deal with in terms of their IT security. What measures will you take to ensure the safety of the firm's computer system and the data it holds?

Reference no: EM131003159

Illegal and to prosecute people that do war driving

There has been an increase in neighbors hacking other neighbors that have open networks. One of the solutions to this issue is just making your network secure, which most us

Does this mean that two separate tcp connections are created

FTP uses two separate well-known port numbers for control and data connection. Does this mean that two separate TCP connections are created for exchanging control informatio

Advantage of new lock interface over synchronized

What is the advantage of new Lock interface over synchronized block in Java? You need to implement a high performance cache which allows multiple reader but single writer to

Implementation of security and authentication mechanisms

In a managers' meeting between the information technology administrator, the lead for the consultant group, and the dean of information technology, it is apparent that a rev

Charity event to the zoo

You volunteer to help drive at a charity event to the zoo, but you can fit only 8 of the 17 children present in your van. How many different groups of 8 children can you dri

Risk management document scoring guide

Based on information from your studies for this unit, prepare a project risk document for your course project. The document should have the following elements in the body:

Designing and prototyping a network

You are tasked with designing and prototyping a network for example.com, a national electronics retailer. Example.com currently has four regional stores (Nth, Sth, Eas, Wes)

Write a fragment of code that assigns the smallest of x y z

Given the integer variables x , y , and z , write a fragment of code that assigns the smallest of x , y , and z to another integer variable min . Assume that all the variabl

Reviews

Write a Review

 
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd